i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative
Upcoming SlideShare
Loading in...5
×
 

i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative

on

  • 1,113 views

i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative. Started in June 2012; they work on the space of BYOD security; Their sweet spot is 100% Agentless device ...

i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative. Started in June 2012; they work on the space of BYOD security; Their sweet spot is 100% Agentless device discovery, fingerprinting and health-check and then denying infected/malicious devices from connecting to corporate network.

Statistics

Views

Total Views
1,113
Views on SlideShare
615
Embed Views
498

Actions

Likes
0
Downloads
4
Comments
0

5 Embeds 498

http://productnation.in 428
http://pn.ispirt.in 49
http://reader.aol.com 13
http://cloud.feedly.com 7
http://avinashdsouza.me 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • To present to potential Customers and POC sites
  • www.poynter.org http://www.iphonehacks.com/2013/01/20-million-jailbroken-devices-cydia.html http://www.androidguys.com/2012/12/14/lookout-18-million-infected-android-devices-by-end-of-2013/
  • www.poynter.org http://www.iphonehacks.com/2013/01/20-million-jailbroken-devices-cydia.html http://www.androidguys.com/2012/12/14/lookout-18-million-infected-android-devices-by-end-of-2013/
  • www.poynter.org
  • www.poynter.org
  • To demo or not to demo! Depending on time, ask. Focus on what you product does and how it does it. Talk about the benefits people will get from the product. Feature---Benefit---Reason. Doing live demos can be fraught with anxiety and too many places to fail. So never do a live demo in the first meeting with an investor. Never! There are three ways to demo your product or service without being on-line. 1-Get your programmers to make everything run locally on your computer without needing an Internet connection at all. 2-Safer:Use SnagIt to capture Web pages that will play back in off-line mode, at least for navigation purposes. 3-BIG Secret: Use Camtasia to record a demo and edit out all of the extra movements and unnecessary screens. Turn off the voice and play back the video of the demo while you do a live voice over guiding your watcher every step of the way. Make the demo under 3 minutes or 2 minutes would be even better.
  • This one for CA-1
  • www.poynter.org
  • This one for CA-1
  • This one for CA-1
  • This one for CA-1
  • Note any gaps so you can engage the investor to help you find the missing person. Why these people will make this business happen. What have they done in the past that makes them appropriate for this new venture? Show Board Members and existing investors to add more credibility to your story.

i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative Presentation Transcript

  • Copyright i7 Networks, i7nw.com
  • Welcome to “Me” Enterprise How BYOD has changed the security map and how “Peregrine 7” helps tackle it? Copyright i7 Networks, i7nw.com Manjunath M Gowda CEO, i7 Networks Bangalore, India manju_s7 in/manjunathgowda/
  • WHY BYOD matters? Copyright i7 Networks, i7nw.com View slide
  • • 90%of enterprises will use personal devices in Enterprise by 2014 - Gartner • 20% Savings: CISCO claimed due to BYOD & declared: “We don’t pay for it, and our users are happier.” • Survey: Enterprises that don't support BYOD are at competitive disadvantage Copyright i7 Networks, i7nw.com View slide
  • So what is stopping them? Copyright i7 Networks, i7nw.com
  • 75% CIOs said Compliance & Security biggest challenge in allowing BYOD Copyright i7 Networks, i7nw.com
  • DARK READING – July 2013 Copyright i7 Networks, i7nw.com
  • Copyright i7 Networks, i7nw.com 62% - Loss of a device that has Sensitive Data – (MDMs solve this) 61% - An infected personal device connecting to the Corporate Network
  • Business overview Copyright i7 Networks, i7nw.com
  • 79% business had a mobile incident last year alone – Checkpoint 600%+ growth in mobile malware in last 2 years 20 Mn+ devices jailbroken in just two months (Jan 2013) 18 Mn infected Android devices by end of 2013 71% mobile devices have OS / application vulnerabilities Copyright i7 Networks, i7nw.com
  • $500K+ cost per such incident $1.5Mn cost per such settlement Copyright i7 Networks, i7nw.com
  • Why traditional tools can’t help here? Copyright i7 Networks, i7nw.com
  • • Perimeter security and not for inside-inside or inside-out threats • Used to IT-owned devices and not personal devices (agented) • Used to take care of outside2inside threats Copyright i7 Networks, i7nw.com
  • So what tools do exist to solve it? Copyright i7 Networks, i7nw.com
  • 15 Copyright i7 Networks, i7nw.com MDMs, EPP Airwatch, MobileIron, Zenprise MAMs Bitzer, IBM, SAP, Good MDPs AT&T toggle, Divide, VMware MNAC i7Networks Device level n e t w o r k Mobile Security Tools Quadrant Server side
  • Our value proposition Copyright i7 Networks, i7nw.com
  • “We protect your network from malicious/infected BYODs” Copyright i7 Networks, i7nw.com
  • “We Protect the Enterprise Network” by -Detect & Fingerprint1 all personal devices -Prevent the malicious devices from connecting -100% Agentless (Zero-touch) -Zero-Latency Deployment -Provide detailed Compliance Reports “To Know & To Protect” 1 Secure detection & fingerprinting (US patent pending) Copyright i7 Networks, i7nw.com
  • • Name • Screen caps • Demo PeregrineGuardTM
  • i7 Networks; i7 Confidential Not just phones, we support all wireless devices.
  • Continuous Monitoring Complete VisibilityComplete Visibility Endpoint AuthenticationEndpoint Authentication Vulnerability and malicious assessment Vulnerability and malicious assessment Granular policy enforcement Granular policy enforcement Compliance ReportingCompliance Reporting Entry Verification – Corporate Wi-Fi or VPN? Entry Verification – Corporate Wi-Fi or VPN? Allow Deny Compromised /Jailbroken/ Unauthorized/Unmanaged check Compromised /Jailbroken/ Unauthorized/Unmanaged check Deny Deny Personal Devices
  • the questions we answer Copyright i7 Networks, i7nw.com
  • Copyright i7 Networks, i7nw.com • What devices are getting into the corporate network? • Who do they belong to? • Are they infected? • Are they compromised or malicious? • How vulnerable are they? • What are they accessing? • What apps* are they running? • Can I control the access? • Can I get Compliance audit reports?
  • How do you deploy? Copyright i7 Networks, i7nw.com
  • • 100% agentless and non-intrusive – Zero Touch • Complete off-line deployment – Zero-Latency • Just ONE probe* in the network • Supports: Corporate Wi-Fi/ Public Wi- Fi/3G/4G/LTE Deployment
  • i7 Networks; i7 Confidential
  • - Microsoft AD, RADIUS and LDAP - Microsoft Exchange - Maas 360 MDM - Microsoft System Center* - IBM Tivoli* - Cisco/Juniper and Fortinet VPN - Snort IDS - CVE database Integrates with
  • Why “Agentless” is Sweet?  Copyright i7 Networks, i7nw.com
  • 14different OS types & growing; Add versions and models5 45% enterprises have more than 5 times as many BYOD as they had 2 years ago3 3.5– Average number of devices per Employee 42%- Average churn of devices per year among enterprise employees < 10% enterprises aware of all mobile devices accessing their network & servers3 27% of devices are ‘approved’ by the company6Copyright i7 Networks, i7nw.com
  • So what’s unique? Copyright i7 Networks, i7nw.com
  • 4A (Attributes) Discovery & Fingerprinting Health Check Discover Apps on the wire*, Policy Enforcement 4A (Attributes) Discovery & Fingerprinting Health Check Discover Apps on the wire*, Policy Enforcement 4D (Deployments) 100% Agentless (Zero-touch), ZERO-Latency SINGLE Probe, Wi-Fi/3G/4G/LTE 4D (Deployments) 100% Agentless (Zero-touch), ZERO-Latency SINGLE Probe, Wi-Fi/3G/4G/LTE 4T (Threat-Protections) Malicious & Intrusion Prevention Zero-day Attack Prevention*, Vulnerability Check Check of anti-malware s/w 4T (Threat-Protections) Malicious & Intrusion Prevention Zero-day Attack Prevention*, Vulnerability Check Check of anti-malware s/w 4K (Keywords) 100% Agentless Patent-Pending Algorithms Detailed Fingerprinting Zero-Latency 4K (Keywords) 100% Agentless Patent-Pending Algorithms Detailed Fingerprinting Zero-Latency
  • Available as : Appliance / Virtual Appliance Available as : Appliance / Virtual Appliance
  • What is that you do MDM cannot? Copyright i7 Networks, i7nw.com
  • oCannot do Discovery and fingerprint of all devices  Authorized  Unauthorized  Unmanaged  Non-mobile devices like e-Readers, Wi-Fi watches, Gaming devices, Healthcare devices etc. Copyright i7 Networks, i7nw.com
  • oMalware detection via signature is only 28%; Cannot catch malicious traffic @ network layer (not even at device layer) oCannot do Access control based on device attributes oCannot enforce different access rules for different departments/ LoBs Copyright i7 Networks, i7nw.com
  • oHot-spotting/Mac-spoofing cannot be detected oFails where you are not allowed to install a client on the device due to privacy or compliance oNot dynamic (need to stop iOS6.1?) Copyright i7 Networks, i7nw.com
  • How different are you from a traditional nac? Copyright i7 Networks, i7nw.com
  •  Support all: Wi-Fi & 3G/4G/LTE  100% Zero Touch (agentless)  Zero Latency (offline) (still we control)  Just ONE probe  Fits into any network infrastructure  Support all: Wi-Fi & 3G/4G/LTE  100% Zero Touch (agentless)  Zero Latency (offline) (still we control)  Just ONE probe  Fits into any network infrastructure  US Patent-pending fingerprinting algorithm  Mac-spoofing/Hot spotting  DVItm (Device Vulnerability Index)  Detecting apps on the wire (dropbox)  US Patent-pending fingerprinting algorithm  Mac-spoofing/Hot spotting  DVItm (Device Vulnerability Index)  Detecting apps on the wire (dropbox)  Completely focused on BYOD Security Completely focused on BYOD Security
  • Product Road Map? Copyright i7 Networks, i7nw.com
  • • Recognition of all Apps on the Wire • Detection of EPP (End Point Protection) tools • Chaining of P7s • Integrations into System Center and Tivoli • Integrations into MDMs • mNAC in the cloud to detect cloud access Copyright i7 Networks, i7nw.com
  • The TEAM Copyright i7 Networks, i7nw.com
  • Jeff Hunter Evangelist Peter Gilson CTO First Last CFO Jack Franklin CMO Heather Adler CEO Investors & Advisors 1st venture: $8.4M by Bluecoat (2010) Team together for second time Started June 12’ Product start Jan 13’
  • Questions? Copyright i7 Networks, i7nw.com manju.m@i7nw.com manju_s7